Vulnerability Details : CVE-2002-0002
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2002-0002
Probability of exploitation activity in the next 30 days: 1.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0002
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0002
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/7741
-
http://marc.info/?l=stunnel-users&m=100869449828705&w=2
-
http://www.securityfocus.com/bid/3748
-
http://www.redhat.com/support/errata/RHSA-2002-002.html
Patch;Vendor Advisory
-
http://online.securityfocus.com/archive/1/248149
-
http://stunnel.mirt.net/news.html
Vendor Advisory
-
http://online.securityfocus.com/archive/1/247427
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3
Products affected by CVE-2002-0002
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.4a:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.14:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.15:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.16:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.21b:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.21c:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.12:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.13:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.21:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.21a:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.17:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.18:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.22:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.24:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.19:*:*:*:*:*:*:*
- cpe:2.3:a:stunnel:stunnel:3.20:*:*:*:*:*:*:*
- cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*